Literature Database

Improved Adversarial Training via Learned Optimizer

Authors: Yuanhao Xiong, Cho-Jui Hsieh | Published: 2020-04-25
Poisoning
Optimization Problem
Adaptive Adversarial Training

NetML: A Challenge for Network Traffic Analytics

Authors: Onur Barut, Yan Luo, Tong Zhang, Weigang Li, Peilong Li | Published: 2020-04-25
TLS Feature Analysis
Malware Classification
Feature Engineering

A Black-box Adversarial Attack Strategy with Adjustable Sparsity and Generalizability for Deep Image Classifiers

Authors: Arka Ghosh, Sankha Subhra Mullick, Shounak Datta, Swagatam Das, Rammohan Mallipeddi, Asit Kr. Das | Published: 2020-04-24 | Updated: 2021-09-09
Poisoning
Adversarial Attack Methods
Optimization Problem

6G White paper: Research challenges for Trust, Security and Privacy

Authors: Mika Ylianttila, Raimo Kantola, Andrei Gurtov, Lozenzo Mucchi, Ian Oppermann, Zheng Yan, Tri Hong Nguyen, Fei Liu, Tharaka Hewa, Madhusanka Liyanage, Ahmad Ijaz, Juha Partala, Robert Abbas, Artur Hecker, Sara Jayousi, Alessio Martinelli, Stefano Caputo, Jonathan Bechtold, Ivan Morales, Andrei Stoica, Giuseppe Abreu, Shahriar Shahabuddin, Erdal Panayirci, Harald Haas, Tanesh Kumar, Basak Ozan Ozparlak, Juha Röning | Published: 2020-04-24 | Updated: 2020-04-30
Secure Communication Channel
Privacy Enhancing Technology
Physical layer security

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

Authors: Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, Aaron Tuor | Published: 2020-04-24
Backdoor Attack
Robustness Analysis
Regularization

Adversarial Attacks and Defenses: An Interpretation Perspective

Authors: Ninghao Liu, Mengnan Du, Ruocheng Guo, Huan Liu, Xia Hu | Published: 2020-04-23 | Updated: 2020-10-07
Poisoning
Adversarial Example
Adversarial Attack Methods

Adversarial Machine Learning in Network Intrusion Detection Systems

Authors: Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian | Published: 2020-04-23
Adversarial Example
Adversarial Attack Methods
Machine Learning

ArchNet: Data Hiding Model in Distributed Machine Learning System

Authors: Kaiyan Chang, Wei Jiang, Jinyu Zhan, Zicheng Gong, Weijia Pan | Published: 2020-04-23 | Updated: 2020-05-31
Encryption Protocol
Machine Learning
Image Processing

Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices

Authors: Lambert T. Leong, Sean Wiere | Published: 2020-04-22
Security Assurance
Role of Machine Learning
Feature Engineering

Live Trojan Attacks on Deep Neural Networks

Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27
Trojan Detection
Attack Method
Deep Learning Technology